From d50617ba8e5fa60c80bcfc85ab99fe5456bf74d2 Mon Sep 17 00:00:00 2001 From: oceans404 Date: Sat, 3 Aug 2024 08:45:05 -0700 Subject: [PATCH] correct program type --- docs/nada-by-example/first-program.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/nada-by-example/first-program.md b/docs/nada-by-example/first-program.md index 7577580..c630419 100644 --- a/docs/nada-by-example/first-program.md +++ b/docs/nada-by-example/first-program.md @@ -82,7 +82,7 @@ The addition program returns one output, the sum to Charlie. Charlie can see the ## Wrap up -In this example, you learned how to use Nada to create a multiplication program that performs blind computation. By defining Party, Input, SecretInteger, performing an Operation, and specifying Output, you can compute on secret inputs from multiple users. This ensures that sensitive data remains confidential throughout the computation process. +In this example, you learned how to use Nada to create an addition program that performs blind computation. By defining Party, Input, SecretInteger, performing an Operation, and specifying Output, you can compute on secret inputs from multiple users. This ensures that sensitive data remains confidential throughout the computation process. The power of Nada lies in its ability to compute on secret inputs without revealing the underlying data to any party involved. This makes Nada programs perfect for applications requiring high levels of privacy and security.